HOFESAC holistic operational framework for establishing situational - - PowerPoint PPT Presentation

hofesac
SMART_READER_LITE
LIVE PREVIEW

HOFESAC holistic operational framework for establishing situational - - PowerPoint PPT Presentation

HOFESAC VizSec 13 HOFESAC holistic operational framework for establishing situational awareness in cyberspace W. Clay Moody Clemson University Supporting work by Judson Dressler, Calvert L. Bowen III, and Jason Koepke HOFESAC Disclaimer


slide-1
SLIDE 1

HOFESAC VizSec ‘13

HOFESAC

holistic operational framework for establishing situational awareness in cyberspace

  • W. Clay Moody

Clemson University Supporting work by Judson Dressler, Calvert L. Bowen III, and Jason Koepke

slide-2
SLIDE 2

HOFESAC VizSec ‘13

Disclaimer

  • The views and opinions expressed in this

presentation are those of the authors and do not necessarily reflect those of Clemson University, the United States Military Academy, United States Cyber Command, or the United States Army

  • Parts of this presentation have undergone a

pre-publication review by various offices of the United States Government

slide-3
SLIDE 3

HOFESAC VizSec ‘13

Agenda

  • Introduction
  • Motivation
  • Background Information
  • Framework Overview
  • Theoretical Case Study
  • Challenges
  • Conclusions
slide-4
SLIDE 4

HOFESAC VizSec ‘13

Cyber SA Reality?

Courtesy of xkcd.com Creative Commons Attribution-NonCommercial 2.5 License.

slide-5
SLIDE 5

HOFESAC VizSec ‘13

Introduction

  • National critical infrastructure has key role in:

Energy Finance Transportation Defense

  • Disruption of US DoD systems significantly

damages ability to defend the nation

  • Must understand the cyber operating environment

to secure the nation

slide-6
SLIDE 6

HOFESAC VizSec ‘13

The View from the Top

  • “The United States is fighting a cyber-war today, and

we are losing. It's that simple. As the most wired nation on Earth, we offer the most targets of significance, yet our cyber-defenses are woefully lacking.”

– Former Director of the NSA, Mike McConnell – Washington Post Feb 2010

  • “... to defend those networks and make good

decision in exercising operational control over them ... will require much greater situational awareness and real-time visibility of intrusions into our networks.”

– Commander, United States Cyber Command (USCYBERCOM) and current Director of the NSA General Keith Alexander – Congressional Testimony 2010

Pictures – Courtesy of Wikipedia : Emphasis added

slide-7
SLIDE 7

HOFESAC VizSec ‘13

Cyberspace doctrine

  • Cyberspace is the newest war fighting

domain (with land, sea, air, and space)

  • No doctrinal definition of “situational

awareness” for DoD

  • Closest was “battlespace awareness” but it

was removed in 2011 “Knowledge and understanding of the

  • perational area’s environment, factors, and

conditions, to include the status of friendly and adversary forces, neutrals and noncombatants, weather and terrain, that enables timely, relevant, comprehensive, and accurate assessments, in order to successfully apply combat power, protect the force, and/or complete the mission”

slide-8
SLIDE 8

HOFESAC VizSec ‘13

Ultimate Goal

  • Maintain strategic and tactical

understanding while continuously taking action or making operational risk decisions

  • To allow incremental progress we must:

– Identify decisions and actions – Identify and access appropriate data – Build analytic tools for data – Visualize data for decision makers

slide-9
SLIDE 9

HOFESAC VizSec ‘13

Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations

CSA

Holistic Operational Framework

Information from all six data classes must be fused, correlated, analyzed, and visualized in near real time for optimal Cyber Situational Awareness

slide-10
SLIDE 10

HOFESAC VizSec ‘13

Threat Environment

  • Identify potential attackers
  • Identify the goals and objectives
  • Identify the normal operations
  • May reveal attackers capability and trends
  • Adversary profiles leads to attribution and

aligning preemptive actions

slide-11
SLIDE 11

HOFESAC VizSec ‘13

Anomalous Activity

  • Firewalls, Antivirus, Intrusion detection systems

detect anomalous activity

  • Rules established based on known attack vectors
  • Unable to detect 0-day or polymorphic exploits
  • Baseline historical and current normalized data

needed to identify anomalies

slide-12
SLIDE 12

HOFESAC VizSec ‘13

Vulnerabilities

  • Vulnerabilities exist in all

systems

  • Technology advances too

rapidly for security

  • Minimize vulnerabilities best
  • ption
  • Must be aware of where the

vulnerabilities exist in your system

  • Must continuously assess

system for vulnerabilities

slide-13
SLIDE 13

HOFESAC VizSec ‘13

Key Terrain

  • Organizations have numerous,

geographically-dispersed systems

  • Full knowledge of all systems is

impractical

  • Must identify key and prioritized cyber

systems

  • Allows for understanding of operational

and technical risk

  • Allows for prioritized defense
slide-14
SLIDE 14

HOFESAC VizSec ‘13

Operational Readiness

  • Must know the readiness and capability of cyber

forces and assets

  • The OR of a cyber force includes

– Readiness of its tools and capabilities – Training and availability of its operators – Integrity of network sensors, paths and systems

  • Must understand mission dependencies
  • Leads to realization of impact of cyber events
slide-15
SLIDE 15

HOFESAC VizSec ‘13

Ongoing Operations

  • Status of all ongoing kinetic and cyber operations

must be considered

  • Deconflict controlled outages and upgrades
  • Dynamic changes in key terrain
  • Adjust defensive procedures for certain

timeframes

  • Reallocate assets to support upcoming missions
slide-16
SLIDE 16

HOFESAC VizSec ‘13

Operational Case Study

  • Emphasize the value of holistic fusion of data

from all six classes

  • A commander and staff make more informed

decisions the closer they are to the intersection of all six classes

  • Decision making process improves as

additional classes of information are considered

slide-17
SLIDE 17

HOFESAC VizSec ‘13

Joint Task Force (JTF)

  • Joint Task Force– Ad hoc military organization formed to

accomplish a specific task

  • Theoretical JTF is conducting missions requiring

continuous flow of logistics and personnel into area of

  • perations
slide-18
SLIDE 18

HOFESAC VizSec ‘13

Commander’s SA Picture

JTF Operations

Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations

CSA

slide-19
SLIDE 19

HOFESAC VizSec ‘13

Pre Operations

  • JTF Commander designates the Logistic Support

System as key cyber terrain

– Unclassified system on Internet, connects to commercial shipping and airflow systems

  • Network sensors protecting system are degraded

and require maintenance scheduled in two months

  • Proficient cyber investigation and forensic unit

attending commercial certification training in US

slide-20
SLIDE 20

HOFESAC VizSec ‘13

Commander’s SA Picture

Logistical System Degraded Network Sensors CYBER UNIT AT TRAINING JTF Operations

Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations

CSA

slide-21
SLIDE 21

HOFESAC VizSec ‘13

During Operations [1 of 3]

  • Critical vulnerability in logistic support system is

discovered

  • Potential patch not available for 30 days due to

required testing with legacy OS

  • Vulnerability allows root level access which could lead

to implant of malicious software on unpatched systems

  • Commander is advised, decides to take no action at

this time

slide-22
SLIDE 22

HOFESAC VizSec ‘13

Commander’s SA Picture

Unpatched Root Level Access, Allows Malware Implant Logistical System Degraded Network Sensors Cyber Unit At Training JTF Operations

Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations

CSA

slide-23
SLIDE 23

HOFESAC VizSec ‘13

During Operations [2 of 3]

  • Cyber alert is released, reports adversary has

increased interest in disrupting and influencing logistical flow

  • Known to deploy Trojan-horse type software
  • n susceptible systems
  • Commander decides to recall cyber force

from training and refocus on monitoring the logistics systems

slide-24
SLIDE 24

HOFESAC VizSec ‘13

Commander’s SA Picture

Adversary Increased Interest in Disrupting Logistics, Employs Trojan horse tactics Logistical System Degraded Network Sensors Cyber Unit At Training JTF Operations

Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations

CSA

Unpatched Root Level Access, Allows Malware Implant

slide-25
SLIDE 25

HOFESAC VizSec ‘13

During Operations [3 of 3]

  • Team discovers anomalous behavior in

logistical support systems

  • Over half the systems are sending

irregular sized traffic over the same TCP port to and IP subnet outside of the US

  • Forensics determine documents are being

slowly exfiltrated over covert channels

slide-26
SLIDE 26

HOFESAC VizSec ‘13

Commander’s SA Picture

Irregular TCP transmissions to non-US IP space

Commander’s SA Picture

Adversary Increased Interest In Disrupting Logistics, Employs Trojan Horse Tactics Logistical System Degraded network sensors Cyber unit at training JTF Operations

Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations

CSA

Unpatched Root Level Access, Allows Malware Implant

slide-27
SLIDE 27

HOFESAC VizSec ‘13

Commanders Actions

  • Initiates crisis action planning
  • Requests immediate upgrade to sensor platforms
  • Directs removal of logistical support system from network
  • Request detail forensics investigation into which files were

stolen to assess operational impact

  • Relocated naval and air assets to protect shipping and

personnel movements

  • Directs daily updates from cyber forces
slide-28
SLIDE 28

HOFESAC VizSec ‘13

Case Study Summation

  • Case Study:

– All SA classes have abundant information – Data is available for consumption by integrated systems or motivated individual

  • Reality:

– Cyber forces don’t concern themselves with ongoing operations – Commanders don’t understand cyber key terrain – Operational Readiness of cyber forces not understood – Vulnerability, threat, and anomalous activity is presented as technical jargon to decision makers

slide-29
SLIDE 29

HOFESAC VizSec ‘13

Challenges

  • Cyber SA requires data and information to

be collected, analyzed, and displayed to user in timely and relevant manner

  • Numerous challenges exist
  • Key barrier involves organizational and

technical challenges

slide-30
SLIDE 30

HOFESAC VizSec ‘13

Challenge 1: Organizational Fear

  • Gaining access to data can lead to turf war
  • Organizations fear giving access to their data

– Humiliation in revealing security flaw – Losing a competitive edge or public confidence – Creation of “1,000 mile screwdriver” from higher

  • Fear prevents complete Cyber SA
  • Must define and enforce a single data owner to

aggregate data for analysis

slide-31
SLIDE 31

HOFESAC VizSec ‘13

Challenge 2: Data Consolidation / Normalization

  • Data collected by humans and automated systems
  • Ingesting all data currently impractical
  • Potential in future with cloud computing and increased

network bandwidth

  • Must determine the proper metrics and alert

thresholds

  • Data must be consolidated and normalized according

to standardized formats

slide-32
SLIDE 32

HOFESAC VizSec ‘13

Challenge 3: Data Synthesis

  • Stove-piped solutions exist today
  • Must fuse stove-piped solutions together with

advanced processing algorithms

  • Establish baseline network activity
  • Move away from signature based detection
  • Discover disparate attacks across geographical

separated network

slide-33
SLIDE 33

HOFESAC VizSec ‘13

Challenge 4: Viz and Dissemination

  • Human intervention will be required until true machine-

to-machine detection

  • Rapid human understanding through visual

presentation of data

  • Geographical (norm) versus logical or temporal view
  • Dissemination plan must be established to get

information to right user within proper authorities and permissions

slide-34
SLIDE 34

HOFESAC VizSec ‘13

Challenge 5: Timeliness

  • Increase of false positives and decrease of

accuracy hamper timely response

  • Cyber attacks occur within milliseconds
  • Summarize vast amounts of data and

delivered in a timely fashion

slide-35
SLIDE 35

HOFESAC VizSec ‘13

Conclusion

  • Robust situational awareness of the cyber

environment is absolutely critical to cyber defense operations

  • Holistic Operational Framework integrates

information from six data classes

  • Enables commanders and leaders to

incorporate cyberspace into decision making process

slide-36
SLIDE 36

HOFESAC VizSec ‘13

Questions?

Acknowledgements: Thanks to Judd Dressler, Triiip Bowen, Jason Koepke, Rob Schrier and Greg Conti